Canada's own Tori and James (phlux) Brine, producing great sounding electronic music for the masses! We started this project in the late 1998. I decided to experiment with keyboards and synthesizers and started to get a little bit more serious with the idea. When I had produced my first (and roughest) CD, I sent it to my sister and she decided to add a little more to what I had composed. Since then, we have been expanding our ideas and trying to let the world hear what we have been making. I... Topic: Algorithm
Redundancy in Public-Private Key PairsLaverna J. ThurstonAbstractThe improvement of active networks is a compelling question. In this paper, we prove the emulation of journaling file systems. Our focus in this work is not on whether the much-touted lossless algorithm for the refinement of forward-error correction by Harris  is recursively enumerable, but rather on introducing an interposable tool for enabling cache coherence (Tarpon). Topic: algorithm
Melodies based on MIDImage 3 Demo Manipulated in Cubase Elements 7 Composed by Ludwig 3 (Chess algorithms) Mastered in Wavelab Elements 7 by using Reaktor 5.9 Ludwig songbase: MIDImage 3 more songbases for Ludwig 3 are here http://archive.org/details/Ludwig3-Addons Topic: algorithm composing
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the... Topics: NIDS, Evasion, Apriori Algorithm, AdaBoost Algorithm, Snort
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the... Topics: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort
History of prime numbers The Sieve of Eratosthenes is a simple, ancient algorithm for finding all prime numbers up to a specified integer. It is the predecessor to the modern Sieve of Atkin, which is faster but more complex. The eponymous Sieve of Eratosthenes was created in the 3rd century BC by Eratosthenes, an ancient Greek mathematician. The Sieve of Eratosthenes is a simple, ancient algorithm for finding all prime numbers up to a specified integer. It is the predecessor to the modern... Topic: Prime Number Algorithm
igA - Algorithm Editor DownloadDesign and analyze various visual algorithms.igA - Algorithm EditorigA - Algorithm EditorVersion 1.1igA - Algorithm Editor Download igA - Algorithm Editor 2014! : SOFTWARE DOWNLOAD.This article alerts we to 2 of the igA - Algorithm Editor countless contract details that may possibly expense we funds plus even you to reduce the igA - Algorithm Editor sale of your home. They learn for a fact that even a little of doubt in your minds concerning the igA - Algorithm... Topic: igA - Algorithm Editor Download
Several robust eigenstructure assignment methods for MIMO systems try to exploit non-uniqueness of controller matrix to optimize certain performance index. In general these methods lead to computational intractability or become too conservative design. Therefore the scope of using randomized algorithms as an alternative exists. Based on well established statistical learning theory algorithms this paper provides methodologies to design robust controller under structured uncertainty by... Topics: Robust Eigenstructure, Randomized Algorithm
In this course design and analysis of algorithms is studied. Methodologies include: divide and conquer, dynamic programming, and greedy strategies. Their applications involve: sorting, ordering and searching, graph algorithms, geometric algorithms, mathematical (number theory, algebra and linear algebra) algorithms, and string matching algorithms. We study algorithm analysis - worst case, average case, and amortized, with an emphasis on the close connection between the time complexity of an... ( 8 reviews ) Topics: algorithms, algorithm design
igA - Algorithm Editor Free. Design and analyze various visual algorithms.igA - Algorithm Editor. igA - Algorithm EditorVersion 1.1igA - Algorithm Editor igA - Algorithm Editor (2015 download) 2015. igA - Algorithm Editoractually accompanies 2000 and above modules as well as the igA - Algorithm Editor big number of extensions thus that it is actually effortless to keep websites plus add functionality. They begin recognizing which the igA - Algorithm Editor children receive hurt in the igA -... Topic: igA - Algorithm Editor Download
Self Portrait using variation on the Mandelbrot Set equation, and a genetic algorithm that finds parameters that generate images using a 50X50 gif image of Ventrella's face as a fitness function. See http://www.ventrella.com/Tweaks/Portraits/ for more info Topics: Mandelbrot, portrait, genetic algorithm
Epidemic applications of power electronic basednon-linear loads result in increase of harmonics in the powersystem. The current harmonics produced by these non-linearloads result in voltage distortion and leads to various powerquality problems. So it is important to eliminate theharmonics in the power system. The harmonic eliminationthrough Shunt Active Power filter (SAPF) provides higherefficiency and more pliable when compared with passive filters.This paper presents a standard surrogate and... Topics: Power Quality, SAPF, PI Control Algorithm, Fuzzy Control Algorithm.
Improving Utilization of Infrastructure CloudA key advantage of Infrastructure-as-a-Service (IaaS) cloud is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly overprovision their infrastructure (or pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on-demand). At the same time, not all users require truly on-demand access to... Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
Martin Pelikan, & David E. Goldberg (2000). Hierarchical Problem Solving by the Bayesian Optimization Algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-200), 267-274. Also IlliGAL Report No. 2000002. Abstract: The paper discusses three major issues. First, it discusses why it makes sense to approach problems in a hierarchical fashion. It defines the class of hierarchically decomposable functions that can be used to test the algorithms that approach... Topics: hierarchical Bayesian optimization algorithm, hBOA, estimation of distribution algorithm, EDA
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of K-Means Clustering AlgorithmInformation world meet many confronts nowadays and one such, is data retrieval from a multidimensional and heterogeneous data set. Han & et al carried out a trail for the mentioned challenge. A novel feature co-selection for web document clustering is proposed by them, which is called Multitype Features Co-selection for Clustering (MFCC). MFCC uses intermediate clustering results in one... Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
Multicast services are increased in exponential manner in these last few years and in particular in the field of multimedia services. Multicast can reduce resources allocation and enhance network performances in terms of QoS, especially in a wireless platforms where the bandwidth is a precious resource. The problem of multicast routing can be reduced to the problem of finding a spanning tree capable to distribute network flow among multicast sources and destinations. It has been established... Topics: Scalable Algorithm, Multicast routing, heterogeneous platforms, Genetic Algorithm, Simulated...
This paper designs a hybrid genetic algorithm for job-shop scheduling combined with a Genetic Algorithm (GA), Simulated Annealing (SA), and a Tabu Search (TS) algorithm. It gives a method for initial population generation for avoiding unreasonable solutions, and introduces SA and TS into the genetic operation mechanism of GA for overcoming the lack of job-shop scheduling optimization. Simulated computations show the superiority of the hybrid genetic algorithm, and examples verify the... Topics: Job-shop Scheduling, Genetic Algorithm, Simulated Annealing Algorithm, Tabu Search
In the last few years, there has been explosive growth in the application of meta-heuristics algorithm for solving Sudoku puzzles in computer science. In this paper we present a hybrid genetic algorithm (HGA) that uses a “random” technology to improve the performance of genetic algorithm. We also show the performance of the algorithms for solving Sudoku puzzles with 46 different examples. The experimental results indicate that HGA is able to produce very competitive results with respect to... Topics: Sudoku, Hybrid Genetic Algorithm, Metaheuristics Algorithm, Optimization, Random Search Strategy
This paper presents the application of Compressive Sensing (CS) theory in radar signal processing. CS uses the sparsity property to reduce the number of measurements needed for digital acquisition, which causes reduction in the size, weight, power consumption, and the cost of the CS radar receiver. Complex Approximate Message Passing (CAMP) algorithm is a fast iterative thresholding algorithm which is used to reconstruct the undersampled sparse radar signal, and to improve the Signal-to-Noise... Topics: Compressive Sensing, CAMP algorithm, Radar.
This paper proposes an approach based on Bacterial Foraging Algorithm (BFA) for optimal placement of Distribution Generations (DGs). The optimal sitting and sizing of distributed generation is formulated as a multi-objective function including the network power losses minimization and voltage profile improvement. BFA algorithm has been employed to optimize the problem. To demonstrate the effectiveness of the proposed approach, it has been applied to 33 and 69 bus systems. The results of the... Topics: Distributed Generation, Optimal Placement, Bacterial Foraging Algorithm (BFA), Genetic Algorithm...
byMartin Pelikan, David E. Goldberg, Erick Cantu-Paz
Martin Pelikan, David E. Goldberg, & Erick Cantú-Paz, E. (1999). BOA: The Bayesian optimization algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-99), I, 525-532. Also IlliGAL Report No. 99003. Abstract In this paper, an algorithm based on the concepts of genetic algorithms that uses an estimation of a probability distribution of promising solutions in order to generate new candidate solutions is proposed. To estimate the distribution, techniques for... Topics: Bayesian optimization algorithm, BOA, estimation of distribution algorithm, EDA, genetic algorithm,...